94 research outputs found

    Secret Message Transmission by HARQ with Multiple Encoding

    Full text link
    Secure transmission between two agents, Alice and Bob, over block fading channels can be achieved similarly to conventional hybrid automatic repeat request (HARQ) by letting Alice transmit multiple blocks, each containing an encoded version of the secret message, until Bob informs Alice about successful decoding by a public error-free return channel. In existing literature each block is a differently punctured version of a single codeword generated with a Wyner code that uses a common randomness for all blocks. In this paper instead we propose a more general approach where multiple codewords are generated from independent randomnesses. The class of channels for which decodability and secrecy is ensured is characterized, with derivations for the existence of secret codes. We show in particular that the classes are not a trivial subset (or superset) of those of existing schemes, thus highlighting the novelty of the proposed solution. The result is further confirmed by deriving the average achievable secrecy throughput, thus taking into account both decoding and secrecy outage.Comment: Proc. Int. Conference on Communications (ICC) 201

    To Obtain or not to Obtain CSI in the Presence of Hybrid Adversary

    Full text link
    We consider the wiretap channel model under the presence of a hybrid, half duplex adversary that is capable of either jamming or eavesdropping at a given time. We analyzed the achievable rates under a variety of scenarios involving different methods for obtaining transmitter CSI. Each method provides a different grade of information, not only to the transmitter on the main channel, but also to the adversary on all channels. Our analysis shows that main CSI is more valuable for the adversary than the jamming CSI in both delay-limited and ergodic scenarios. Similarly, in certain cases under the ergodic scenario, interestingly, no CSI may lead to higher achievable secrecy rates than with CSI.Comment: 8 pages, 3 figure

    Wireless Network Control with Privacy Using Hybrid ARQ

    Full text link
    We consider the problem of resource allocation in a wireless cellular network, in which nodes have both open and private information to be transmitted to the base station over block fading uplink channels. We develop a cross-layer solution, based on hybrid ARQ transmission with incremental redundancy. We provide a scheme that combines power control, flow control, and scheduling in order to maximize a global utility function, subject to the stability of the data queues, an average power constraint, and a constraint on the privacy outage probability. Our scheme is based on the assumption that each node has an estimate of its uplink channel gain at each block, while only the distribution of the cross channel gains is available. We prove that our scheme achieves a utility, arbitrarily close to the maximum achievable utility given the available channel state information

    Joint PHY/MAC layer security design using ARQ with MRC and null-space independent PAPR-aware artificial noise in SISO systems

    Get PDF
    Automatic-repeat-request (ARQ) as a MAC layer mechanism and artificial noise (AN) as a physical layer mechanism along with the help of maximal ratio combining (MRC), are jointly designed to achieve secrecy. Basically, a special AN, which does not require null-space in the channel, is designed based on the quality of service requirements and the channel condition between the legitimate parties and injected to the data packet. If the same packet is requested by the legitimate receiver (Bob), an AN canceling signal is properly designed and added to the next packet. Then, an AN-free packet is obtained by using MRC process at Bob, while deteriorating the eavesdropper's performance. Furthermore, two simple closed-form expressions of the achievable secure throughput are derived. The first one is given in a closed-form for the case of ARQ scheme without AN, while the second one is given in an upper-bound form for the case of ARQ with AN. Moreover, this paper addresses two critical security-associated problems: 1) the joint design of secrecy, reliability, throughput, delay and the tradeoff among them, and 2) the increase in the peak-to-average power ratio (PAPR) due to the added AN. Finally, the proposed design is extended to OFDM to demonstrate its capability in not only enhancing the secrecy due to the frequency selectivity of the channel, but also in reducing the PAPR and out-of-band emission of OFDM-based waveforms, while maintaining secrecy.No sponso

    Rate Adaptation for Incremental Redundancy Secure HARQ

    No full text
    International audienceThis paper studies secure communication based on incremental redundancy (INR) secure hybrid automatic retrans-mission request (HARQ) protocol over block-fading wiretap channels. The transmitter has no instantaneous channel state information (CSI) available from either main channel or the eavesdropper channel, hence the coding rates cannot be adapted to instantaneous channel conditions. We investigate the outage performance for two schemes of INR secure HARQ protocols: case 1) when there exists two reliable multi-bit feedback channels from both legitimate receiver and eavesdropper to the transmitter carrying a function of outdated CSI, case 2) when there is a multi-bit feedback channel only from legitimate receiver. In both cases, we demonstrate that using the information carried via multi-bit feedback channels, the transmitter can adapt the coding rates in order to achieve a better secrecy throughput using a smaller number of transmissions comparing to the ACK/NACK feedback channel model. For some parameters, our rate adaptation protocol achieves a strictly positive secrecy throughput whereas it is equal to zero for the protocol with ACK/NACK feedback. We show that for some set of parameters, the loss of secrecy throughput between case 1 and case 2 is very small compared to the gain provided by both protocols

    Secure Communication with a Wireless-Powered Friendly Jammer

    Get PDF
    In this paper, we propose to use a wireless-powered friendly jammer to enable secure communication between a source node and destination node, in the presence of an eavesdropper. We consider a two-phase communication protocol with fixed-rate transmission. In the first phase, wireless power transfer is conducted from the source to the jammer. In the second phase, the source transmits the information-bearing signal under the protection of a jamming signal sent by the jammer using the harvested energy in the first phase. We analytically characterize the long-time behavior of the proposed protocol and derive a closed-form expression for the throughput. We further optimize the rate parameters for maximizing the throughput subject to a secrecy outage probability constraint. Our analytical results show that the throughput performance differs significantly between the single-antenna jammer case and the multi-antenna jammer case. For instance, as the source transmit power increases, the throughput quickly reaches an upper bound with single-antenna jammer, while the throughput grows unbounded with multi-antenna jammer. Our numerical results also validate the derived analytical results.Comment: accepted for publication in IEEE Transactions on Wireless Communication
    corecore